Skip to main content

The Security Architecture of the Java Operating System JX – A Security Architecture for Distributed Parallel Computing

  • Conference paper
Book cover Advanced Parallel Processing Technologies (APPT 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2834))

Included in the following conference series:

  • 546 Accesses

Abstract

Using the unneeded computation power in the internet for distributed computing is getting more and more eligible. To increase the willingness to provide unneeded computing power, a secure platform is needed for the execution of untrusted code. We present the architecture of the JX operating system, which can be used to safely execute untrusted code. The problem of erroneous agents crashing the system is solved by using Java – a typesafe language – as implementation language. The resource consumption of the agents is controlled by a security manager, that inspects every interaction between an agent and a system service. If the security policy does not approve the use of a system service, the access can be denied. An agent execution system build upon JX is presented to illustrate the security problems occurring and the solutions provided by the operating system JX.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, M., Pose, R., Wallace, C.S.: A password-capability system. The Computer Journal 29, 1–8 (1986)

    Article  Google Scholar 

  2. Back, G., Hsieh, W.C., Lepreau, J.: Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java. In: Proc. of 4th Symposium on Operating Systems Design & Implementation (2000)

    Google Scholar 

  3. Boebert, W.E.: On the inability of an unmodified capability machine to enforce the *- property. In: Proc. of the 7th DoD/NBS Computer Security Conference, pp. 291–293 (1984)

    Google Scholar 

  4. Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single Address Space Operating System. ACM Trans. on Computer Systems 12(4), 271–307 (1994)

    Article  Google Scholar 

  5. Czajkowski, G., Daynes, L.: Multitasking without Compromise: A Virtual Machine Evolution. In: Proc. of the OOPSLA 2001, pp. 125–138 (2001)

    Google Scholar 

  6. Czajkowski, G., von Eicken, T.: JRes: A Resource Accounting Interface for Java. In: Proc. Of Conference on Object-Oriented Programming Systems, Languages, and Applications 1998, pp. 21–35. ACMPress, New York (1998)

    Google Scholar 

  7. Dean, D., Felten, E.W., Wallach, D.S., Balfanz, D., Denning, P.J.: Java security: Web browsers and beyond. In: Denning, D.E. (ed.) Internet Beseiged: Countering Cyberspace Scofflaws, pp. 241–269. ACM Press, New York (1998)

    Google Scholar 

  8. Dennis, J.B., Van Horn, E.C.: Programming Semantics for Multiprogrammed Computations. Communications of the ACM 9(3), 143–155 (1966)

    Article  MATH  Google Scholar 

  9. Doorn, L.v.: A Secure Java Virtual Machine. In: Proc. of the 9th USENIX Security Symposium, pp. 19–34 (2000)

    Google Scholar 

  10. Fabry, R.S.: Capability-based addressing. Communications of the ACM 17(7), 403–412 (1974)

    Article  Google Scholar 

  11. Ferraiolo, D., Kuhn, R.: Role-based access controls. In: Proc. of the 15th National Computer Security Conference, pp. 554–563 (1992)

    Google Scholar 

  12. Frantz, B.: KeyKOS – a secure, high-performance environment for S/370. In: Proc. Of SHARE 70, pp. 465–471 (1988)

    Google Scholar 

  13. Gefflaut, T., Jaeger, Y., Park, J., Liedtke, K., Elphinstone, V., Uhlig, J.E., Tidswell, L., Deller, L., Reuther, L.: The SawMill Multiserver Approach. In: Proc. of the 9th SIGOPS European Workshop (2000)

    Google Scholar 

  14. Hardy, N.: The confused deputy. Operating Systems Review 22(4), 36–38 (1988)

    Article  Google Scholar 

  15. Hawblitzel, C., Chang, C.-C., Czajkowski, G., Hu, D., Eicken, T.v.: Implementing Multiple Protection Domains in Java. In: Proc. of the USENIX Annual Technical Conference, pp. 259–270 (1998)

    Google Scholar 

  16. Heiser, G., Elphinstone, K., Russel, S., Vochteloo, J.: Mungi: A Distributed Single Address- Space Operating System. In: 17th Australiasion Computer Science Conference, pp. 271–280 (1994)

    Google Scholar 

  17. Jaeger, T., Tidswell, J., Gefflaut, A., Park, Y., Liedtke, J., Elphinstone, K.: Synchronous IPC over Transparent Monitors. In: 9th SIGOPS European Workshop (2000)

    Google Scholar 

  18. Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM 16(10), 613–615 (1973)

    Article  Google Scholar 

  19. Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: Usenix 2001 Freenix Track (2001)

    Google Scholar 

  20. Mealy, G., Witt, B., Clark, W.: The Functional Structure of OS/360. IBM Systems Journal 5(1), 3–51 (1966)

    Article  Google Scholar 

  21. Moon, D.A.: Symbolics Architecture. In: IEEE Computer, vol. 20(1), pp. 43–52. IEEE, Los Alamitos (1987)

    Google Scholar 

  22. Organick, E.I.: Computer System Organization. The B5700/B6700 Series. Academic Press, Inc., New York (1973)

    Google Scholar 

  23. Rushby, J.: Design and Verification of Secure Systems. In: Proc. of the 8th Symposium on Operating System Principles, pp. 12–21 (1981)

    Google Scholar 

  24. Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: a fast capability system. In: Symposium on Operating Systems Principles, pp. 170–185 (1999)

    Google Scholar 

  25. Shapiro, M.: Structure and Encapsulation in Distributed Systems: The Proxy Principle. In: ICDCS 1986, pp. 198–204 (1986)

    Google Scholar 

  26. Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Anderson, D., Lepreau, J.: The Flask Security Architecture: System Support for Diverse Security Policies. In: Proc. of the 8th USENIX Security Symposium (1999)

    Google Scholar 

  27. Tanenbaum: Chapter 7. In: Distributed Operating Systems, Prentice Hall, Englewood Cliffs (1995)

    Google Scholar 

  28. Waldspurger, A., Weihl, W.E.: Stride Scheduling: Deterministic Proportional-Share Resource Mangement. Technical Report MIT/LCS/TM-528, Massachusetts Institute of Technology, MIT Laboratory for Computer Science (1995)

    Google Scholar 

  29. Webpage of VMWare, http://www.vmware.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wawersich, C., Felser, M., Golm, M., Kleinöder, J. (2003). The Security Architecture of the Java Operating System JX – A Security Architecture for Distributed Parallel Computing. In: Zhou, X., Xu, M., Jähnichen, S., Cao, J. (eds) Advanced Parallel Processing Technologies. APPT 2003. Lecture Notes in Computer Science, vol 2834. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39425-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39425-9_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20054-3

  • Online ISBN: 978-3-540-39425-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics